Understanding the Meterpreter core commands
Let's start by using Meterpreter commands to understand their functionality. As it is a post-exploitation tool, we will require a compromised target to execute the commands. We will be using the Metasploitable 3 machine as a target that we have exploited using the Microsoft Windows Authenticated User Code Execution exploit module.
Getting ready
To avoid setting up the Microsoft Windows Authenticated User Code Execution exploit module every single time we want to test Meterpreter commands, we will use one of my favorite Metasploit Framework features, resource scripts. Resource scripts provide an easy way for us to automate repetitive tasks in Metasploit.
How to do it...
- The Metasploit Framework comes packed with several resource scripts that have been contributed to by the community, which you can find at
/usr/share/metasploit-framework/scripts/resource/
in your Kali Linux machine:
root@kali:~# ls /usr/share/metasploit-framework/scripts/resource/ auto_brute...